Skip to main content
purple hex pattern
man and woman on laptop on server room

nShield general purpose HSMs

nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption, key management, and more. nShield hardware security modules are available in a range of FIPS 140-2 & 140-3 certified form factors and support a variety of deployment scenarios.

Our Portfolio

entrust nshield 5c with fips certification product image
HSM

nShield 5c HSM


nShield 5c HSMs are security appliances that deliver cryptographic services to applications across the network, in the cloud, and in hybrid environments. Deliver cryptographic key services to applications distributed across servers and virtual machines with Entrust’s crypto-agile, highly scalable, next-generation hardware security modules (HSMs).
nshield 5s with fips certification product image
HSM

nShield 5s HSM


nShield 5s HSMs are PCIe cards that perform encryption, digital signing, and key generation for an extensive range of commercial and custom-built applications, including certificate authorities, code signing, and more.
nshield connect image
HSM

nShield Connect


Enhance security with nShield Connect HSMs - certified, networked appliances providing cryptographic key services across servers and virtual machines.
promo shield solo image
HSM

nShield Solo


nShield Solo HSMs are PCI-Express card-based solutions that deliver cryptographic key services to applications hosted on individual servers and appliances.
HSM

nShield as a Service


Discover how nShield as a Service (nSaaS) can help your organization leverage cryptographic services in the cloud.
HSM nShield Edge product image
HSM

nShield Edge


nShield Edge hardware security modules (HSMs) are portable USB-connected HSMs that provide cryptographic key services for low-volume transaction environments.
nshield connect image
HSM

nShield HSMi


Certified hardware designed to deliver scalable cryptographic services for issuance software

HSM Management and Monitoring

Cut operational costs, increase uptime, and improve efficiency by managing and overseeing your nShield HSMs from one location. Learn more about each product below.

The nShield Difference: Security World

Only nShield HSMs feature Security World, a specialized architecture that provides unmatched capabilities in several crucial areas:

administrator settings icon

Full Control

Security World provides strong, granular controls over the access and usage of keys and policies.

cloud with arrow up icon

Easier Backups

Unlike alternatives that require backup HSMs and labor-intensive HSM cloning, Security World enables simple, automated backups of HSM files.

square expand icon

Scalability and Flexibility

Security World delivers unlimited key storage and the flexibility needed to align your HSM operations with your organization’s specific needs.

wired network icon

Streamlined HSM Operations

nShield HSMs can be managed centrally based on unified policy and operational administration, no matter how many nShields you deploy.

Security World Architecture White Paper

Product Uses

plum checkmark icon

Public Key Infrastructure

nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.

plum checkmark icon

Code Signing

nShield HSMs sign your application code so you can ensure that your software remains secure, unaltered and authentic.

plum checkmark icon

Digital Certificates

nShield HSMs create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

nShield Software Products

CodeSafe

Develop and execute sensitive code within a FIPS 140-2 Level 3 certified nShield hardware security module.

faded gray hex background

Software Option Packs

Software that extends the capability of your HSMs to fit your needs.

faded gray hex background